SquirrelMail Multiple Cross Site Scripting and Clickjacking Vulnerabilities


Description   Multiple vulnerabilities have been identified in SquirrelMail, which could be exploited by attackers to gain knowledge of sensitive information or perform certain actions. These issues are caused by design and input validation errors related to the user interface, message display, and drop-down selection lists, which could allow clickjacking a cross site scripting attacks.
     
Vulnerable Products   Vulnerable Software:
SquirrelMail version 1.4.21 and prior
     
Solution   Apply patches : http://www.squirrelmail.org/security/issue/2011-07-10http://www.squirrelmail.org/security/issue/2011-07-11http://www.squirrelmail.org/security/issue/2011-07-12
     
CVE   CVE-2011-2752
CVE-2011-2023
CVE-2010-4555
CVE-2010-4554
     
References   http://www.squirrelmail.org/security/issue/2011-07-10
http://www.squirrelmail.org/security/issue/2011-07-11
http://www.squirrelmail.org/security/issue/2011-07-12
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
XSS - Prevention - GET : suspicious 'iframe' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'meta' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious tag with event found in URL
3.2.0
XSS - Prevention - GET : suspicious 'applet' tag found in URL
3.2.0
XSS - Phishing : suspicious 'div' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'style' attribute found in URL
3.2.0
XSS - Prevention - GET : suspicious 'img' tag found in URL
3.2.0
XSS - Phishing : suspicious 'a' tag found in URL
3.2.0
XSS - Prevention - GET : cookie access attempt using script language found in URL
3.2.0
XSS - Prevention - GET : suspicious 'embed' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'object' tag found in URL
3.2.0
XSS - Phishing : suspicious 'form' tag found in URL
3.2.0
XSS - Prevention - GET : javascript code found in URL
3.2.0
XSS - Prevention - GET : evasion attempt using tag characters encoding in URL
3.2.0
XSS - Prevention - GET : suspicious 'style' tag found in URL
3.2.0
XSS - Phishing : suspicious 'link' tag found in URL
3.2.0
XSS - Prevention - GET : 'script' tag found in URL
3.2.0
XSS - Prevention - GET : 'location' javascript object found in URL
3.2.0
XSS - Prevention - GET : suspicious 'div' tag found in URL
3.2.0
     


 
 
 
 
 Risk level 
Moderate 

 Vulnerability First Public Report Date 
2011-07-12 

 Target Type 
Server 

 Possible exploit 
Local & Remote